{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-25132","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2024-02-05T18:35:14.363Z","datePublished":"2025-03-19T17:57:14.659Z","dateUpdated":"2025-07-23T17:37:05.459Z"},"containers":{"cna":{"title":"Openshift-dedicated: hive: hibernation controller denial of service","metrics":[{"other":{"content":{"value":"Moderate","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in the Hive hibernation controller component of OpenShift Dedicated. The ClusterDeployment.hive.openshift.io/v1 resource can be created with the spec.installed field set to true, regardless of the installation status, and a positive timespan for the spec.hibernateAfter value. If a ClusterSync.hiveinternal.openshift.io/v1alpha1 resource is also created, the hive hibernation controller will enter the reconciliation loop leading to a panic when accessing a non-existing field in the ClusterDeployment’s status section, resulting in a denial of service."}],"affected":[{"versions":[{"status":"affected","version":"0","lessThan":"126c7eb43aa55a008b8f0cf594e7bd18086841eb","versionType":"git"}],"packageName":"hive","collectionURL":"https://github.com/openshift/hive","defaultStatus":"unaffected"}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2024-25132","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2260371","name":"RHBZ#2260371","tags":["issue-tracking","x_refsource_REDHAT"]}],"datePublic":"2025-03-19T17:41:52.402Z","problemTypes":[{"descriptions":[{"cweId":"CWE-400","description":"Uncontrolled Resource Consumption","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-400: Uncontrolled Resource Consumption","workarounds":[{"lang":"en","value":"Red Hat Product Security does not have a recommended mitigation at this time. Please update to a patched version as soon as it is available."}],"timeline":[{"lang":"en","time":"2024-01-24T00:00:00.000Z","value":"Reported to Red Hat."},{"lang":"en","time":"2025-03-19T17:41:52.402Z","value":"Made public."}],"credits":[{"lang":"en","value":"This issue was discovered by Thibault Guittet (Red Hat)."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2025-07-23T17:37:05.459Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-19T18:19:16.582586Z","id":"CVE-2024-25132","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-19T18:19:31.345Z"}}]}}